Abstract | ||
---|---|---|
We present a novel approach to authenticate and authorize a user, using her personal smartphone. The presented architecture is complemented with a proof-of-concept implementation. The implemented system architecture is based on a single sign-on solution (SSO), extended to allow the usage of the smartphone as authentication and authorization device. We evaluated the system within real-world scenarios, observing users' behavior using the novel technique. Based on our experiences, we summarize advances, made both in usability and security, for novel implementations using the proposed concept. |
Year | DOI | Venue |
---|---|---|
2013 | 10.1007/978-3-642-53862-9_50 | COMPUTER AIDED SYSTEMS THEORY, PT II |
Keywords | Field | DocType |
Mobile Computing, Mobile Authentication, Mobile Authorization, Proxy Authentication, Mobile Security, Secure Authentication, Single Sign-On | Mobile computing,Single sign-on,Authentication,Computer science,Implementation,Human–computer interaction,Artificial intelligence,Systems architecture,World Wide Web,Architecture,Usability,User Friendly,Machine learning | Conference |
Volume | ISSN | Citations |
8112 | 0302-9743 | 0 |
PageRank | References | Authors |
0.34 | 7 | 5 |
Name | Order | Citations | PageRank |
---|---|---|---|
Luis Roalter | 1 | 208 | 17.19 |
Stefan Diewald | 2 | 179 | 15.37 |
Andreas Möller | 3 | 222 | 18.35 |
Tobias Stockinger | 4 | 38 | 4.82 |
Matthias Kranz | 5 | 442 | 37.93 |